A covert queueing channel in fcfs schedulers
AE Ghassami, N Kiyavash - IEEE Transactions on Information …, 2018 - ieeexplore.ieee.org
We study covert queueing channels (CQCs), which are a kind of covert timing channel that
may be exploited in shared queues across supposedly isolated users. In our system model …
may be exploited in shared queues across supposedly isolated users. In our system model …
A covert queueing channel in round robin schedulers
We study a covert queueing channel (CQC) between two users sharing a round robin
scheduler. Such a covert channel can arise when users share a resource such as a …
scheduler. Such a covert channel can arise when users share a resource such as a …
Capacity limit of queueing timing channel in shared FCFS schedulers
AE Ghassami, X Gong… - 2015 IEEE International …, 2015 - ieeexplore.ieee.org
The capacity of a queueing timing channel in which a user modulates messages to another
user via his pattern of access to a shared resource scheduled in an FCFS manner is …
user via his pattern of access to a shared resource scheduled in an FCFS manner is …
Covert bits through queues
P Mukherjee, S Ulukus - 2016 IEEE Conference on …, 2016 - ieeexplore.ieee.org
We consider covert communication using a queuing timing channel in the presence of a
warden. The covert message is encoded using the inter-arrival times of the packets, and the …
warden. The covert message is encoded using the inter-arrival times of the packets, and the …
Capacity estimation and auditability of network covert channels
BR Venkatraman… - Proceedings 1995 IEEE …, 1995 - ieeexplore.ieee.org
Classical covert channel analysis has focused on channels available on a single computer:
timing channels and storage channels. We characterize network covert channels. Potential …
timing channels and storage channels. We characterize network covert channels. Potential …
Design and performance evaluation of a covert timing channel
R Archibald, D Ghosal - Security and Communication Networks, 2016 - Wiley Online Library
In a model‐based covert timing channel (CTC), the (covert) sender modulates the inter‐
packet delays (IPDs) of the packet stream generated by the overt application (source) by …
packet delays (IPDs) of the packet stream generated by the overt application (source) by …
Information theoretic analysis of side channel information leakage in FCFS schedulers
X Gong, N Kiyavash… - 2011 IEEE International …, 2011 - ieeexplore.ieee.org
The information leakage of a queuing side channel in two-user-shared scheduling system is
studied from an information theoretic perspective. In the queueing side channel, a malicious …
studied from an information theoretic perspective. In the queueing side channel, a malicious …
Sneak-peek: High speed covert channels in data center networks
With the advent of big data, modern businesses face an increasing need to store and
process large volumes of sensitive customer information on the cloud. In these …
process large volumes of sensitive customer information on the cloud. In these …
[PDF][PDF] Modeling, analysis, and detection of information leakage via protocol-based covert channels
J Jaskolka - 2010 - researchgate.net
With the emergence of computers in every day activities and with the ever-growing
complexity of networks and network protocols, covert channels are becoming an eminent …
complexity of networks and network protocols, covert channels are becoming an eminent …
Design and analysis of a model-based Covert Timing Channel for Skype traffic
R Archibald, D Ghosal - 2015 IEEE Conference on …, 2015 - ieeexplore.ieee.org
In a model-based Covert Timing Channel (CTC), the (covert) sender modulates the inter-
packet delays (IPDs) of the packet stream generated by the overt application (source) by …
packet delays (IPDs) of the packet stream generated by the overt application (source) by …